Chapter 7

Identity and Access Management

IN THIS CHAPTER

Bullet Controlling access and designing an identification and authentication strategy

Bullet Federating identity and managing authorization mechanisms

Bullet Managing the identity and access lifecycle and implementing authentication systems

Identity and access management (IAM) is often the first — and sometimes the only — line of defense between adversaries and sensitive information. In fact, in the modern cloud era, with ubiquitous mobile computing and anywhere, anytime access to applications and data, many security practitioners now refer to identity as “the new perimeter.” Security professionals must have a thorough understanding of the concepts and technologies involved. This domain represents 13 percent of the CISSP certification exam and is composed of the following exam objectives:

  1. 5.1 Control physical and logical access to assets
  2. 5.2 Design identification and authentication strategy
  3. 5.3 Federated identity with a third-party service
  4. 5.4 Implement and manage authorization mechanisms
  5. 5.5 Manage the identity and access provisioning lifecycle
  6. 5.6 Implement authentication systems

Control Physical and Logical Access to Assets

IAM is a collection ...

Get CISSP For Dummies, 8th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.